Online
cuenta google oppo A15 frp con nck
Código:
oppo A15 frp remove done
[Reset FRP]
Waiting for device...Found
Port Info : MediaTek USB Port_V1632 (COM79) [\\?\usb#vid_0e8d&pid_0003#5&212ac8fc&0&3#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
: BROM PORT
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : 9D7097C67CC9730E28E29264731E6E66
SoC ID[0] : C9640AA1A5AD2A6922DD5BB1D58C607A
SoC ID[1] : F3EBAAE7E04C642511130BF5167F2D05
Executing Exploit...Done
Reading Preloader...OK
Saved as : preloader_oppo6765.bin
Loading EMI Config from Preloader...OK
Sec. Cfg : [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : brom
Speed : HIGH-SPEED
Reading EMI Configuration...OK
EMMC CID : 150100444836444142086C0EDC282899
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
HRID : 90CFB4B2ED5C53BBAF7579FB5CB0E48F
Int. RAM : 0x0000000000038000 [224.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : DH6DAB
CID : 150100444836444142086C0EDC282899
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000E8F800000 [58.24 GB]
Reading Parititon Info...OK
And. Ver. : 10
Build Dt. : Thu Feb 22 00:44:37 CST 2024
Display ID : QP1A.190711.020 release-keys
Locale : en-US
Patch : 2023-02-05
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.2]
LOG TXT : 20241125_171719.txt